SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you view failed WSUS updates on the WSUS server?
By running the Update Status summary report.
Restrict when a child can logon to a computer.
It is the max size is expressed in megabytes.
A OOBE ready and will be booted into Windows Welcome
2. What does running network monitor in PMode do?
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
Either from wbadmin or windows server backup.
3. What is AH?
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
Setup a GlobalNames zone.
It is the authentication header protocol and digitally sign packets but not encrypt them.
Increase the SOA refresh interval parameter.
4. How does transparent caching work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Can configure a GPO to prevent all removable storage devices?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. How do you set a DNS server to a cache only DNS server?
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
Create persistent connections to computers with POWERSHELL
Delete all the zone files or reinstall the DNS service.
7. How do you calculate the original subnet mask of a network that was divided in to multiple networks?
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
8. What do you do if you install an older operating AFTER you install Windows 7?
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
By unbinding the DHCP protocol from the nic attached to the subnet.
Does not
4 (bits 49 - 52) /52 Allows for 16 regions.
9. What happens when 3rd party vendors create a new driver?
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
Yes - it can be modified to apply to a network location.
Disable AutoComplete in Internet Explorer
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
10. What is the responsible person on a SOA records field?
You can allow by adding the device vendor's GUID to the allow list in a GPO.
an email address where the @ is replaced with a period.
They are monitored but not enforced. Users can exced there quota limit.
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
11. How do you have a Firewall rule apply only to a specific computer?
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
A OOBE ready and will be booted into Windows Welcome
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
12. What do Print permission only allows?
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Use AD integrated zones so the clients can update to more than one DNS server.
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
13. Can users can share encrypted files with another user by giving them permission?
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
Add an AD integrated zone
14. What does WINRM QUICKCONFIG do?
Yes
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
4 (bits 53 - 56) /56 Allows for 16 regions
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
15. What drive is System protection is automatically setup on?
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
Adds a file based zone
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
16. What is a ns record?
It designates an authoritative DNS server - not the soa record.
A roecord to indicate the smtp server.
The latest Vista Service Pack
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
17. What are some of the IPV6 transition technologies?
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
Can be configured through a GPO
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
ISATAP - Teredo and 6to4
18. ________________ can be replicated through Ad replication.
IPV4 and IPV6
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
Conditional forward
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
19. What is the Microsoft Application Compatibility Toolkit (ACT)?
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
20. What is WinRS?
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
dynamic drives
21. In case the _______________ - DHCP clients can be configured with an alternative static ip address?
Use Safe Mode and then roll back the driver if it was recently updated.
Windows Aero was revised to be more touch-friendly.
A roecord to indicate the smtp server.
DHCP server cannot assign an ip address
22. How do you create a subscription?
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Using wecutil -cs in an xml file.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
23. How do you install applications in Windows XP Mode?
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
24. What do wireless access points need in order for NAP to enforce wireless access policy (WAP)?
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
WPA-Personal (uses a preshared key)
They need to be configured us use 802.1x RADIUS authentication
25. How many bits are in the site subnet?
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
WIndows Update Server
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
26. How can you communicate accross the IPV6 accross a IPV4 network?
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
Modify/Create a GPO
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
27. What is BCD?
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
DHCP server cannot assign an ip address
28. What is Touch UI?
Increase the SOA refresh interval parameter.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
By either using WSUS management console (server side targeting) or GPO (client side targeting).
Windows Aero was revised to be more touch-friendly.
29. What is jetpack.exe?
Yes - it can be modified to apply to a network location.
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
30. What is Client for Microsoft Networks?
Either from wbadmin or windows server backup.
Yes
It is the Microsoft SMB client for accessing shared network resources
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
31. What is a reservation?
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
It create a report of which files will be migrated
DNS suffix search lists
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
32. What does System Protection cover?
Turn off the Log Spooler event on a print server.
Pool Active Directory.
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
System Restore Points as well as Previous Versions of Files (configured through the System applet).
33. What does Windows uses the index for?
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
an email address where the @ is replaced with a period.
Can be configured through a GPO
34. How do you add the Windows 7 VHD to the boot choices menu?
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
Use the BCDEDIT.EXE command
35. How do you secure a WSUS connection to a remote SQL server?
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
IPSEC
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
36. What mode is BranchCache configured for branch offices with fewer than 50 users?
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
Anew vpn protocol that uses SSL (port 443) for encryption.
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
37. What is s stub zone?
Contains a list of dynamically updated list of authorities for the zone.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Modify/Create a GPO
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
38. What is a NPS server?
Only sites added to the local Intranet Zones
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
39. What is Aero Shake?
Internet printing protocol. Used for connecting to printers via web browser.
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
1723
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
40. What is an example of a rule based on file attributes derived from the digital signature?
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Use the BCDEDIT.EXE command
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
41. What can NAP do?
Export and import it from another computer.
Use it to can backup certificates to a .PFX file that is password protected.
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Place unhealthy computers in a quarantined network and auto-remediate clients.
42. What does the PSCONSOLEFILE option in POWERSHELL do?
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Create a customized shell
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
43. What happens if the router advertisement has the M flag set to 1?
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
The latest Vista Service Pack
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
Configure a GPO to modify the computers location to look for updates.
44. What is an example of a exceptions to rule?
It can enable a windows feature on an offline image with the /Enable-Feature option
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
45. How do you ping the IPV6 address of a remote computer?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. How are RRAS/NPS policies evaluated?
A type of port forwarding that allows public network computers on a Private network through nat devises.
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
47. What does Internet Explorer store while you are surfing using InPrivate Browsing?
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
They must be configured with the ip addresses of the radius server.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
48. How do you repartition your hard disk by using the Shrink feature in Disk Management?
On a core server
Yes
Problem history but also application installation history.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
49. How do you restore individual files?
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
Either from wbadmin or windows server backup.
WPA-Enterprise (radius authentication)
50. What are the minimum hardware requirements for Windows 7?
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
It can speed up your computer by using storage space on most USB flash drives and flash memory cards. ReadyBoost is designed to help when your PC's memory is running low. Low memory can make your computer sluggish because Windows - which needs a plac
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back